CVE-2022-36079: Parse Server vulnerable to brute force guessing of user sensitive data via search patterns
8.6
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.67535%
CWE
Published
9/16/2022
Updated
1/30/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| parse-server | npm | < 4.10.14 | 4.10.14 |
| parse-server | npm | >= 5.0.0, < 5.2.5 | 5.2.5 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from two key issues: 1) validateQuery in DatabaseController.js permitted internal/protected fields in queries without master key validation due to insufficient key checks. The commit diff shows the patch added isMaster and update parameters to enforce authorization. 2) RestQuery.js's execute flow did not include denyProtectedFields prior to the fix, leaving protected fields exposed. The addition of denyProtectedFields in the patch confirms this gap. Both functions directly handled query validation/execution and their pre-patch behavior aligns with the vulnerability's mechanics.